Combating Alert Fatigue with the MixMode AI Assistant

Combating Alert Fatigue with the MixMode AI Assistant

Combating alert fatigue is a huge challenge faced by SOC analysts and security companies alike. The overwhelming flood of rules-based alerts and notifications can often lead to missed critical incidents and increased ...
Firewalls Are Not Enough: Understanding the Fortinet Flaw and How MixMode Enhances Security

Firewalls Are Not Enough: Understanding the Fortinet Flaw and How MixMode Enhances Security

Firewalls have been the go-to solution for years, but as technology advances, so do the tactics of malicious actors. A recent security flaw discovered in Fortinet firewalls has reignited the debate about ...
Detecting the MOVEit Zero-Day: How MixMode AI Stays Ahead of Threats

Detecting the MOVEit Zero-Day: How MixMode AI Stays Ahead of Threats

We discuss a real-life example of a zero-day exploit, focusing on the MOVEit Transfer Software, and how MixMode can detect and mitigate such threats before they become widespread ...

New Video: Broken Promises and Bright Future – Preparing for the Next Wave of AI in Cybersecurity

MixMode’s Chief Strategy Officer, Matt Shea was invited to provide the opening keynote address, setting the stage for discussions on how businesses and municipalities can better protect their networks and environments from ...

How to Identify IcedID Network Traffic

Brad Duncan published IcedID (Bokbot) from fake Microsoft Teams page earlier this week. In this video I take a closer look at the PCAP file in that blog post. The video cannot ...
Alerts produced by CapLoader 1.9.5 after loading the three PCAP files from malware-traffic-analysis.net

CapLoader 1.9.5 Alerts on Malicious Traffic

CapLoader 1.9.5 was released today! The most important addition in the 1.9.5 release is the new Alerts tab, in which CapLoader warns about malicious network traffic such as command-and-control protocols. The alerts ...
How to turn the tables on tomorrow's threat agent

How to turn the tables on tomorrow’s threat agent

Traditional security solutions worked fine when there was a strict perimeter around the corporate network, and workers only needed to access it when they were physically in the office on a corporate ...
Making sense of Zero Trust in cybersecurity.

Making sense of Zero Trust in today’s cyber climate

Unless you don’t work in the security industry, the term Zero Trust is nearly as common as malware by now–and if you haven’t heard of it before, we certainly hope you’re not ...
Modernizing Phoenix's Cybersecurity to Combat Nation-State Attacks

Video: Modernizing Phoenix’s Cybersecurity to Combat Nation-State Attacks

Shannon Lawson, CISO for the City of Phoenix, and Geoffrey Coulehan, Head of Sales for MixMode recently joined forces for a fireside chat at the Evanta CISO Summit in Phoenix, AZ. Lawson ...
Why Zero-Trust in Video Conferencing is Crucial

Why Zero-Trust in Video Conferencing is Crucial

By now you’ve likely heard the term “zero-trust” and how it relates to cybersecurity. A few years ago, it was in more of a conceptual stage, two attached words floating about like ...
Security Boulevard